What a mesh!
The ins and outs of mesh networking — Part 1

OEM Technology Solutions
By Joel K Young, Digi International
Tuesday, 23 June, 2009


Over the past few years, mesh networks have become more popular, following the trend to create more wireless things. As with other technology trends, as mesh networking has developed, so has a plethora of different mesh networking technologies and architectures.

We need to bring order to the mess of mesh networks, so first we’ll discuss network basics, focusing on the specifics of wireless. Second, we’ll present criteria for evaluating the different wireless mesh networking technologies. We’ll look at what you need to know about wireless mesh networking and what criteria you should use when assessing a mesh networking technology.

Networking basics

Network topologies describe the interaction and interconnection of the participants; how they communicate with each other and how they establish paths among each other. Network topologies are not always what they seem. In wired networks, topologies generally follow the path of the wires, so if devices are wired in a ring, then the network topology is a ring. In wireless networking we all share the same air space so the path and access method are not always obvious. For example, is a Wi-Fi access point a star topology or a bus?

Before we begin our discussion, let’s review some common terminology that will be used throughout this article and in Part 2.

  • DSSS — direct sequence spread spectrum. This is a method of signal encoding that distributes information over a wide section of the spectrum using a pseudorandom code. Because of the wide spread, the signal appears to be noise for those without the spreading code.
  • FHSS — frequency hopping spread spectrum. This is similar to DSSS, the big differences being its use of a more constrained spreading algorithm and the fact that it changes channels as a function of time — theoretically making the transmission more immune to interference.
  • TSMP — time synchronised mesh protocol. This mesh protocol uses time slots to allocate parts of the spectrum for communication between two nodes. Because time slots differ between pairs, interference is minimised because channel access is controlled by time slot.
  • AODV — ad hoc on-demand distance vector routing algorithm. AODV is a pure on-demand route acquisition algorithm — nodes that do not lie on active paths do not maintain any routing information nor do they participate in any periodic routing table exchanges. Furthermore, a node does not have to discover and maintain a route to another node until the two need to communicate.
  • Cluster-tree. A region-based mesh network routing algorithm in which routes are formed and maintained between clusters of nodes. Route discovery is completed and maintained between the clusters, providing access to the children of each cluster.
  • ISM — the industrial, scientific and medical bands. This describes licence-free frequency bands. Generally we refer to the 2.4 GHz band, although in North America the ISM bands also include those at 900 MHz, 5.8 GHz and 433 MHz. The 2.4 GHz band is used worldwide.
  • IPv6 — internet protocol version 6. This is the latest version of the popular IP or internet protocol. With version 6, the IP address structure, routing and class of service change. IPv6 is part of the TCP/IP suite of protocols sponsored by the Internet Engineering Task Force (IETF).
  • PAN ID — personal area network identifier. This is the term for the network name assigned to a particular personal area network (PAN).
  • CSMA — carrier sense multiple access. This protocol defines the channel access technique used by ethernet, Wi-Fi and bus-oriented networks. It provides a method for detecting collisions and retransmits packets to acquire a communications channel.
  • TDMA — time division multiple access. This protocol defines the channel access technique used by TSMP and GSM networks in which a communications channel is divided into time slots. Each node is allocated a specific time slot for communication.

Basic network types

Figure 1 shows three common and well-known network topologies: star, bus and ring. The ring is most common in cabled networks, but could conceivably be used in a wireless fashion as well, although this would not be practical unless it were used over long distances. In the wireless case, open space is often a shared medium, so open space often appears as a bus.


Figure 1: Common network topologies.

The Wi-Fi access point is a familiar example of the star, routing all messages through the access point. However, even though messages are routed through the access point, open space is accessed via CSMA, a bus-type protocol.

Mesh networks

In a mesh network, paths between nodes are not defined by a specific architectural pattern, but rather by the connections themselves. In the full mesh topology (Figure 2), each node is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others while some are connected only to those other nodes with which they exchange the most data.

Another important characteristic is that some or all nodes may be routers and some or all nodes may be end points. Typically, full interconnection is not achieved unless the network is very small. Full interconnection gets very complex very quickly.

  


Figure 2: A full mesh where each of the five nodes is connected to all the others.

Figure 3 illustrates three different instantiations of mesh networks. The green nodes are end devices, the yellow nodes are routers (which may also be end devices) and the purple node is the network coordinator responsible for allowing nodes to join and depart from the mesh. Note that one instantiation of a mesh can be a star — a mesh with one router and the rest as end points. The cluster-tree network is a combination of near full connectivity among routers with end points hanging off individual routers. A peer-to-peer mesh generally gives equal rights to all nodes, including routing and end point functionality.


Figure 3: Different implementations of mesh networks.

When evaluating wireless networks, particularly mesh networks, there are a number of difficult problems that need to be solved.

Accessing the medium

Since we all share open space, listening is more important than talking. If everyone talks at once, listening is difficult. So radios must be good listeners if they are going to have a chance to get a word in edgeways, so to speak.

Discovering routes

Determining paths in a wireless mesh network is difficult because the environment is dynamic. In this case, there are two choices: plan the trip in advance or take it one step at a time. Often doing both is best; this usually involves retracing one’s steps and repeating well-travelled routes.

Adapting to a changing environment

In a wireless world, paths to nodes can disappear and reappear due to changing signal or traffic conditions.

Sleeping and waking

Once we go wireless, the next step often involves finding a way to do without the traditional power cable. This means using batteries and requiring effective power management. The most common way of handling power management is to put the nodes to sleep when they are not being used, which sounds well and good until it is time to wake up.

How to compare

Security

We can evaluate security using the traditional factors that are well understood in the industry. The first is encryption — protecting the information itself. Modern encryption wants at least AES128 as an algorithm (using a 128-bit key). The next is authentication, which is validating that the users (or nodes) are who they say they are and this is typically handled by key exchange or an authenticated certificate. The last is authorisation, which involves the granting of permission based on having the right key or certificate. Other factors are associated with the ease of distributing and configuring the authorisation and authentication mechanisms.

Reliability

The best way to think of reliability is the ability of a message to be delivered to the desired destination on time. If the message always arrives at the destination when expected, the network is very reliable. We also want the message to arrive at the destination, even if it is a bit late. The components for evaluating reliability for wireless mesh networks involve the following:

  • Frequency agility: Detecting potential interference and adapting the network around it.
  • Message loss potential: With all the rerouting and different paths, the network must be very careful to ensure messages don’t get lost and that duplicate messages following different routes are discarded.
  • Adaptability: Best described as the network’s ability to change the routing to accommodate for nodes disappearing while still preventing lost messages. This is most effective if done quickly.
  • Single points of failure: Are there any single points of failure, what is the risk of them failing and how is recovery handled?

Power management

The most frequently asked question when discussing wireless sensor networks is how long will the batteries last, because everyone wants to keep maintenance needs low. Within the context of network architecture, power management is analysed in terms of end nodes, router nodes and network coordinators. It is most important to have low-powered, power-efficient end nodes because they are most likely to be located far from traditional wired power sources. Battery-powered routers or routers that sleep extend the flexibility of the architecture. Finally, the network coordinator is usually powered.

For sleeping nodes, we need to look at their average power consumption. This is best assessed by looking at how they wake up, how frequently they wake up, total transmitting time and total listening time. Because the most power is consumed when radios transmit, it is important to keep this to a minimum.

Scalability

How big can the network get before it fails, at least on a practical level? All the networks have large physical limits (in terms of physical addresses) in the tens of thousands of nodes, but the practical design of the network is always much smaller. This is because scalability is related both to reliability mechanisms and to the nature of the application. If a network never experiences problems that cause rerouting, then network routing tables will never change, meaning cached routes will always work and that there will be few retransmissions or reroutes because of failures. The end result is a very stable network that can be very large.

The other aspect concerns the type and volume of data and these can be categorised as dribble data, bursty data or streaming data — and they mean just what the names suggest. Dribble data is periodic, infrequent and slow, while streaming data is constant, and so on. A network can be very large if the traffic is made up of dribble data because the flow follows consistent patterns, with plenty of bandwidth. Sleeping networks do well with dribble data, but scale poorly with streaming data.

Data movement

We need to look in more detail at data flow to assess raw capacity. There is a classic trade-off in needs: does the application require lots of data with low latency or does it require dribble data with long, nondeterministic latency? In evaluating networks for data movement, consider a combination of the following five variables: data rate, latency, packet size, fragmentation and range.

Cost

Cost is measured by the individual unit cost as well as the cost to maintain the network. In this context, maintenance is often difficult to quantify and deployment cost is often forgotten. It is easiest to quantify those variables that are most perceptible, namely the actual purchase cost of a transceiver system per node. This becomes more complicated when trading off the number of battery-powered or sleeping nodes. For example, if you assume all end points need to be sleeping end points, then a point-to-multipoint system is not practical due to range. In contrast to a network that has sleeping routers, a network that doesn’t have sleeping routers will need to deploy powered routers in addition to the end points. Even if all radios cost the same, more radios are needed in the powered router system. However, if power is available, then this becomes a non-issue.

In Part 2

The second part of this article will present an overview of four different mesh-related technologies including their key characteristics, network architectures, strengths and limitations. Finally, we’ll aggregate the information and create an evaluation overview of these different technologies, including when they should be applied.

OEM Technology Solutions
www.oem.net.au
Digi International
www.digi.com

 

Related Articles

Industrial wireless networks — comparing the standards: Part 2

In Part 1 of this article, we reviewed the history of wireless sensor networks (WSNs) and defined...

Industrial wireless networks - comparing the standards: Part 1

Today wireless instrumentation is becoming more commonplace in process plants and is a more...

Modernise and maintain: implementing wireless to monitor beyond the P&ID

Many operational and maintenance problems around a plant can be solved by deploying WirelessHART...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd